Preferred Language
Articles
/
ijs-12444
A Secure Session Management Based on Threat Modeling
...Show More Authors

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many cases, an attacker who manages to obtain a valid ID of user’s session can use it to directly enter that session – often without arising user’s suspicion. A secure session management must be implemented in the development phase of web applications because it is the responsibility of the web application, and not the underlying web server.
Threat modeling is a systematic process that is used to identify threats and vulnerabilities in software and has become popular technique to help system designers think about the security threats that their system might face.
In this paper we design the threat modeling for session’s ID threat by using SeaMonster security modeling software, and then propose a secure session management that avoids the vulnerabilities. The proposed secure session management is designed to give trust authentication between the client and the server to avoid session hijacing attack by using both: server session’s ID and MAC address of the client.Visual Studio. Net 2008 is used in implementing the proposed system

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Organic Solid Waste in Vessel Composting System
...Show More Authors

Low-level microbial activity due to the production of organic acids is a recognized problem during the initial phase of food waste composting. Increasing such activity levels by adjusting the pH values during the initial composting phase is the primary objective to be investigated. In this study, sodium acetate (NaoAc) was introduced as an amendment to an in-vessel composting system. NaoAc was added when the pH of the compost mixture reached a low level (pH < 5), the addition increased pH to 5.8. This had a positive effect on the degradation of organic materials i.e. the formation of methane gas compared to the results without NaoAc addition.

The results also proved that anaerobic-aerobic in-vessel composting could reduce the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the internal audit in the performance enhancing
...Show More Authors

  After the internal audit as a tool of internal control in any organization, and helps in the evaluation of all internal control activities, as a tool to ensure compliance with the plans and policies to achieve the goals of the institution as much as possible of the efficiency, effectiveness, and should have the Internal Audit full independence and is linked to senior management, and aims to get the credibility and accuracy of information and data, and keep abreast of modern developments.

  The practical side includes the preparation of the questionnaire, which included a set of questions that fit the hypothesis of the research, was Tozeiha the research sample consisting of employees of the Internal Audit Department an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 29 2024
Journal Name
Chemical Engineering Research And Design
Comprehensive review of severe slugging phenomena and innovative mitigation techniques in oil and gas systems
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أثر سياسة السجلات المحاسبية المفتوحة كأحد آليات إدارة التكلفة في تحقيق الميزة التنافسية للشركات الصناعية المساهمة العامة الأردنية
...Show More Authors

The aim of this research is to study and test the impact of the policy of open-book accounting as one of the cost management mechanisms in achieving the competitive advantage in Jordanian industrial public companies, to achieve the objectives of the study, a field study was conducted by surveying the views of a sample of the accountants of the Jordanian industrial public companies. Hence the arithmetical Means, the Standard Deviations, the Significant Value and the Simple Linear Regression are used to test the research hypotheses and to achieve the research goals. The results of the study showed that there is a statistically significant effect of the policy of open-book accounting as one of the cost management mechanisms in achieving the

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The impact of strategic approach in the effectiveness of small and medium Enterprises in Iraq
...Show More Authors

The purpose of this research highlight the achievement of the effectiveness of small and medium enterprises dimensions and conformable to analyze the relationship between business strategies and human resources management strategies , and launched search of a dilemma thought provoking fundamental questions revolve around the search is the lack of appropriate strategies in these enterprises to help them continuity and permanence in business and markets , as these enterprises lack the human resources management strategies appropriate , as well as business strategies that make them withstand the changes in the market environment is changing and volatile . It was to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Tasks Implemented by Internal Auditors when Developing and Executing Business Continuity and Recovery Plan to Face the COVID-19 crisis
...Show More Authors

The current research aimed to identify the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis. It also aims to identify the recovery and resuming plan to the business environment. The research followed the descriptive survey to find out the views of 34 internal auditors at various functional levels in the Kingdom of Saudi Arabia. Spreadsheets (Excel) were used to analyze the data collected by a questionnaire which composed of 43 statements, covering the tasks that the internal auditors can perform to face the COVID-19 crisis. Results revealed that the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis is to en

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Open Engineering
Using ANN for well type identifying and increasing production from Sa’di formation of Halfaya oil field – Iraq
...Show More Authors
Abstract<p>The current study focuses on utilizing artificial intelligence (AI) techniques to identify the optimal locations of production wells and types for achieving the production company’s primary objective, which is to increase oil production from the Sa’di carbonate reservoir of the Halfaya oil field in southeast Iraq, with the determination of the optimal scenario of various designs for production wells, which include vertical, horizontal, multi-horizontal, and fishbone lateral wells, for all reservoir production layers. Artificial neural network tool was used to identify the optimal locations for obtaining the highest production from the reservoir layers and the optimal well type. Fo</p> ... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Rationalization of costs by using the tool of the quality function deployment: / applied research in the State Company for Textile and Leather Industries
...Show More Authors

The research aims to apply one of the techniques of management accounting, which is the technique of the quality function deployment on the men's leather shoe product Model (79043) in the General Company for Textile and Leather Industries by determining the basic requirements of the customer and then designing the characteristics and specifications of the product according to the preferences of the customer in order to respond to the customer's voice in agreement With the characteristics and technical characteristics of the product, taking into account the products of the competing companies to achieve the maximum customer satisfaction, the highest quality and the lowest costs. Hence, the importance of research has emerged, which indicat

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
An Artificial Intelligence Algorithm to Optimize the Classification of the Hepatitis Type
...Show More Authors

Hepatitis is one of the diseases that has become more developed in recent years in terms of the high number of infections. Hepatitis causes inflammation that destroys liver cells, and it occurs as a result of viruses, bacteria, blood transfusions, and others. There are five types of hepatitis viruses, which are (A, B, C, D, E) according to their severity. The disease varies by type. Accurate and early diagnosis is the best way to prevent disease, as it allows infected people to take preventive steps so that they do not transmit the difference to other people, and diagnosis using artificial intelligence gives an accurate and rapid diagnostic result. Where the analytical method of the data relied on the radial basis network to diagnose the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref